Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-15702
HistoryAug 04, 2020 - 12:00 a.m.

CVE-2020-15702

2020-08-0400:00:00
ubuntu.com
ubuntu.com
12
apport vulnerability privilege escalation

CVSS2

4.4

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

CVSS3

7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

28.9%

TOCTOU Race Condition vulnerability in apport allows a local attacker to
escalate privileges and execute arbitrary code. An attacker may exit the
crashed process and exploit PID recycling to spawn a root process with the
same PID as the crashed process, which can then be used to escalate
privileges. Fixed in 2.20.1-0ubuntu2.24, 2.20.9 versions prior to
2.20.9-0ubuntu7.16 and 2.20.11 versions prior to 2.20.11-0ubuntu27.6. Was
ZDI-CAN-11234.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchapport< 2.20.9-0ubuntu7.16UNKNOWN
ubuntu20.04noarchapport< 2.20.11-0ubuntu27.6UNKNOWN
ubuntu14.04noarchapport< 2.14.1-0ubuntu3.29+esm5UNKNOWN
ubuntu16.04noarchapport< 2.20.1-0ubuntu2.24UNKNOWN

CVSS2

4.4

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

CVSS3

7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

28.9%